ComputerWeekly.com Research Library

Powered by Bitpipe.com

Encryption Standards Research

  • Securing Corporate Data in the Age of Mobile Computing

    Sponsored by: TechTarget Security

    This Expert Briefing from SearchConsumerization.com discusses key tips for enterprises to allow employees to work from their personal devices while ensuring corporate data remains secure.

  • Securing the enterprise application layer: Expert Guidelines

    Sponsored by: TechTarget Security

    If you're a security professional, the focus on application security in IT these days may leave you feeling out of the loop. Yet, in many cases, application security pros rely on the infrastructure team to provide a secure foundation.  Find out how securing a naming and directory service will help build a solid platform that application can trust.

  • Compliance and Cloud Security eBook

    Sponsored by: TechTarget Security

    SearchSecurity.com presents a comprehensive guide to compliance and cloud security. Our experts cover all the angles in order to help clarify security and compliance issues associated with cloud computing.

  • Building the Right Mobile Security Toolkit

    Sponsored by: TechTarget Security

    Due to the rapid proliferation of mobile security threats, it’s critical that organizations put a new emphasis on their mobile device security strategies. This expert tip explores today’s threats to mobile devices and offers suggestions for building the right mobile security toolkit to prevent them from doing harm.

  • UCB Gains Efficiencies and Realizes Lower TCO with CallCopy Call Recording

    Sponsored by: NACR

    Uncover why a implementing a CallCopy recording solution that is easy to use, search, update, support and maintain can offer a lower TCO than other solutions, as well as fulfilling all your call recording needs.

  • Best practices for implementing 2048-bit SSL

    Sponsored by: Citrix

    Ready for 2048-bit SSL? Not with the competition. Shift to Citrix NetScaler for 2x faster 2048-bit SSL performance. Download the 2048-bit Performance Kit.

  • Technical Guide on Windows Security

    Sponsored by: TechTarget Security

    SearchSecurity.com presents a comprehensive guide to Windows security. Our experts help you discover all of the security enhancements made to Windows 7, including BitLocker, AppLocker, DirectAccess and the Win7 Firewall. You’ll learn how to use these tools to help your organization better manage your Windows security efforts.

  • Presentation Download: Data Protection Strategies: Data Encryption

    Sponsored by: CDW Healthcare

    If data is encrypted, health care providers are not subject to new, strict data breach notification laws. Server, storage and network encryption adds yet another layer of protection. So why do so many organizations avoid encryption? This presentation download will cover the basics of encryption and explain why its benefits outweigh its costs.

  • Eguide: Avoiding a patient data breach – and how to handle one if it does occur

    Sponsored by: CDW Healthcare

    In order to maintain patient privacy while complying with HIPAA standards, medical records must be tightly protected and there must be a solid backup plan in place in the case of a data breach. In this e-guide, learn how to prevent data breaches as well as what to do should a safety breach occur.

  • The Complete Guide to Backup and Recovery for the SMB

    Sponsored by: Nexsan

    Small and mid-sized businesses are a market that has been underserved by data protection software, appliances and online backup services until the last few years.Yet, these organizations have the same needs as large enterprises to protect their data. Full-time, dedicated IT resources are often beyond their means.

  • Reducing PCI DSS Scope with the First Data® TransArmor® Solution

    Sponsored by: First Data Corporation

    Organizations who handle payment card data are obligated to comply with the Payment Card Industry Data Security Standard (PCI DSS). This whitepaper discusses how the TransArmor® solution can enable scope reduction, minimizing costs and effort of PCI compliance.

  • Simplifying management and lowering total cost of ownership for SSL certificates

    Sponsored by: GlobalSign

    This white paper explains the basics of using a Managed PKI for SSL solution to alleviate such issues, the benefits of using GlobalSign’s Managed SSL Solution and how this solution enables organisations to quickly and simply manage their SSL Certificates, as well as significantly reduce the operating costs of using SSL.

  • IDC Technology Spotlight: Leveraging the Benefits of Cloud Computing with Specialized Security

    Sponsored by: Trend Micro

    There is shift in threat landscape with the emergence of cloud; while offering significant benefits, cloud computing expands the playing field for cybercriminals and increase security demands, IDC Spotlight explores the technology of cloud based security

  • Magic Quadrant for Mobile Data Protection

    Sponsored by: Sophos

    This Magic Quadrant is a snapshot of the overall market that ranks vendors against each other, according to competitive criteria. Vendors in any quadrant, as well as those not ranked on the Magic Quadrant, may be appropriate for your enterprise's needs and budget.

  • Data Privacy e-Book

    Sponsored by: TechTarget ComputerWeekly.com 

    SearchSecurity.Co.UK presents a comprehensive guide to data privacy in the UK. Our experts cover all the angles in order to help you protect the data your organisation collects, transmits and stores.

  • Security in the Cloud: New Intel® technologies enable more secure business computing in the cloud

    Sponsored by: Intel

    Intel has developed new technologies to help improve cloud security, and has been collaborating with leading hardware and software solution providers to enable more comprehensive and integrated solutions that can make it easier for businesses to adopt cloud computing. Continue reading to learn more.

  • Solution Brief: SAP and Blue Coat

    Sponsored by: BlueCoat

    Blue Coat’s WAN Optimization technology is especially well suited to improving response times and reducing bandwidth consumption for SAP users, by prioritizing SAP applications and guaranteeing performance over non-critical or recreational traffic.

  • Cloud Security: Built from the Ground Up

    Sponsored by: Intel

    Cloud computing offers the promise of much greater efficiency, flexibility and more simplified datacenters, but it also presents new data security challenges. Learn how executives from Terremark, VMware, and Intel view the challenges and how cloud security technology built into hardware provides the most robust protection to platforms and data.

  • Boost Cloud Security with Intel® AES-NI

    Sponsored by: Intel

    Including Intel® AES-NI in your cloud strategy reduces code size, execution cycles, and vulnerability to attacks while boosting performance.

  • How Can You Prepare for the Consumerization of IT

    Sponsored by: DynTek & McAfee

    The consumerization of IT is all about productivity. That’s the finding from a recent survey of organizations that currently allow or plan to allow employees to use personal IT devices and consumer-driven software on the enterprise network. Read this paper to view strategies McAfee recommends to prepare for the consumerization of IT.

  • 2010 Annual Study: U.S. Enterprise Encryption Trends

    Sponsored by: Symantec Corporation

    This survey addresses the maturity of an organization’s IT security and data protection program, how encryption is used in organizations, encryption features organizations consider most important, and much more.

  • The Malware Report: The Evolution of Anti-malware and the 2011 Threat Landscape

    Sponsored by: ESET

    In the 200th episode of “The Malware Report” Matt Grant talks with Randy Abrams and Paul Lansky about the past 4 years and how the threat landscape has evolved and changed over the years. In this podcast, Randy and Paul discuss many of these changes. Listen to this podcast to hear more. 

  • E-Book: Data Protection Plans for Complying with Privacy Laws

    Sponsored by: TechTarget Security

    This e-book, brought to you by SearchCompliance.com and SearchSecurity.com, discusses how to build a successful data protection strategy, as well as database security auditing tools, how to secure your mainframe, laptop encryption and more!

  • PCI DSS: Next-Generation Data Security, Storage and Integrity

    Sponsored by: TechTarget Security

    SearchSecurity.com presents a comprehensive guide to PCI DSS. Our experts cover all the angles in order to help your efforts in meeting compliance with the credit card industry’s data security standard.

  • Cloud-Stored Offsite Database Backups

    Sponsored by: Oracle Corporation

    Cloud backups are the right protection for databases running within the compute Cloud. Read this white paper to learn about how Cloud storage can be a benefit to your organization.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.